l2cap_sock.c 33.6 KB
Newer Older
1 2 3 4 5
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2000-2001 Qualcomm Incorporated
   Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>
   Copyright (C) 2010 Google Inc.
6
   Copyright (C) 2011 ProFUSION Embedded Systems
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

   Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth L2CAP sockets. */

30
#include <linux/module.h>
31
#include <linux/export.h>
32

33
#include <net/bluetooth/bluetooth.h>
34
#include <net/bluetooth/hci_core.h>
35
#include <net/bluetooth/l2cap.h>
36 37

#include "smp.h"
38

39 40
bool enable_lecoc;

41 42 43 44
static struct bt_sock_list l2cap_sk_list = {
	.lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
};

45
static const struct proto_ops l2cap_sock_ops;
46
static void l2cap_sock_init(struct sock *sk, struct sock *parent);
47 48
static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
				     int proto, gfp_t prio);
49

50 51 52 53 54 55
bool l2cap_is_socket(struct socket *sock)
{
	return sock && sock->ops == &l2cap_sock_ops;
}
EXPORT_SYMBOL(l2cap_is_socket);

56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81
static int l2cap_validate_bredr_psm(u16 psm)
{
	/* PSM must be odd and lsb of upper byte must be 0 */
	if ((psm & 0x0101) != 0x0001)
		return -EINVAL;

	/* Restrict usage of well-known PSMs */
	if (psm < 0x1001 && !capable(CAP_NET_BIND_SERVICE))
		return -EACCES;

	return 0;
}

static int l2cap_validate_le_psm(u16 psm)
{
	/* Valid LE_PSM ranges are defined only until 0x00ff */
	if (psm > 0x00ff)
		return -EINVAL;

	/* Restrict fixed, SIG assigned PSM values to CAP_NET_BIND_SERVICE */
	if (psm <= 0x007f && !capable(CAP_NET_BIND_SERVICE))
		return -EACCES;

	return 0;
}

82 83 84
static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
{
	struct sock *sk = sock->sk;
85
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
86 87 88 89 90 91 92 93 94 95 96 97
	struct sockaddr_l2 la;
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (!addr || addr->sa_family != AF_BLUETOOTH)
		return -EINVAL;

	memset(&la, 0, sizeof(la));
	len = min_t(unsigned int, sizeof(la), alen);
	memcpy(&la, addr, len);

98
	if (la.l2_cid && la.l2_psm)
99 100
		return -EINVAL;

101 102 103
	if (!bdaddr_type_is_valid(la.l2_bdaddr_type))
		return -EINVAL;

104
	if (bdaddr_type_is_le(la.l2_bdaddr_type)) {
105
		if (!enable_lecoc && la.l2_psm)
106 107
			return -EINVAL;
		/* We only allow ATT user space socket */
108 109
		if (la.l2_cid &&
		    la.l2_cid != __constant_cpu_to_le16(L2CAP_CID_ATT))
110 111 112
			return -EINVAL;
	}

113 114 115 116 117 118 119 120 121 122
	lock_sock(sk);

	if (sk->sk_state != BT_OPEN) {
		err = -EBADFD;
		goto done;
	}

	if (la.l2_psm) {
		__u16 psm = __le16_to_cpu(la.l2_psm);

123 124 125 126
		if (la.l2_bdaddr_type == BDADDR_BREDR)
			err = l2cap_validate_bredr_psm(psm);
		else
			err = l2cap_validate_le_psm(psm);
127

128
		if (err)
129 130 131
			goto done;
	}

132
	if (la.l2_cid)
S
Santosh Nayak 已提交
133
		err = l2cap_add_scid(chan, __le16_to_cpu(la.l2_cid));
134 135
	else
		err = l2cap_add_psm(chan, &la.l2_bdaddr, la.l2_psm);
136

137 138
	if (err < 0)
		goto done;
139

140
	switch (chan->chan_type) {
141 142 143 144
	case L2CAP_CHAN_CONN_LESS:
		if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_3DSP)
			chan->sec_level = BT_SECURITY_SDP;
		break;
145 146 147 148 149 150
	case L2CAP_CHAN_CONN_ORIENTED:
		if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_SDP ||
		    __le16_to_cpu(la.l2_psm) == L2CAP_PSM_RFCOMM)
			chan->sec_level = BT_SECURITY_SDP;
		break;
	}
151

152
	bacpy(&chan->src, &la.l2_bdaddr);
153
	chan->src_type = la.l2_bdaddr_type;
154

155 156 157
	if (chan->psm && bdaddr_type_is_le(chan->src_type))
		l2cap_le_flowctl_init(chan);

158
	chan->state = BT_BOUND;
159
	sk->sk_state = BT_BOUND;
160 161 162 163 164 165

done:
	release_sock(sk);
	return err;
}

166 167
static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr,
			      int alen, int flags)
168 169
{
	struct sock *sk = sock->sk;
170
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
171 172 173 174 175 176 177 178 179 180 181 182 183
	struct sockaddr_l2 la;
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (!addr || alen < sizeof(addr->sa_family) ||
	    addr->sa_family != AF_BLUETOOTH)
		return -EINVAL;

	memset(&la, 0, sizeof(la));
	len = min_t(unsigned int, sizeof(la), alen);
	memcpy(&la, addr, len);

184
	if (la.l2_cid && la.l2_psm)
185 186
		return -EINVAL;

187 188 189
	if (!bdaddr_type_is_valid(la.l2_bdaddr_type))
		return -EINVAL;

190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214
	/* Check that the socket wasn't bound to something that
	 * conflicts with the address given to connect(). If chan->src
	 * is BDADDR_ANY it means bind() was never used, in which case
	 * chan->src_type and la.l2_bdaddr_type do not need to match.
	 */
	if (chan->src_type == BDADDR_BREDR && bacmp(&chan->src, BDADDR_ANY) &&
	    bdaddr_type_is_le(la.l2_bdaddr_type)) {
		/* Old user space versions will try to incorrectly bind
		 * the ATT socket using BDADDR_BREDR. We need to accept
		 * this and fix up the source address type only when
		 * both the source CID and destination CID indicate
		 * ATT. Anything else is an invalid combination.
		 */
		if (chan->scid != L2CAP_CID_ATT ||
		    la.l2_cid != __constant_cpu_to_le16(L2CAP_CID_ATT))
			return -EINVAL;

		/* We don't have the hdev available here to make a
		 * better decision on random vs public, but since all
		 * user space versions that exhibit this issue anyway do
		 * not support random local addresses assuming public
		 * here is good enough.
		 */
		chan->src_type = BDADDR_LE_PUBLIC;
	}
215 216 217 218

	if (chan->src_type != BDADDR_BREDR && la.l2_bdaddr_type == BDADDR_BREDR)
		return -EINVAL;

219
	if (bdaddr_type_is_le(la.l2_bdaddr_type)) {
220
		if (!enable_lecoc && la.l2_psm)
221 222
			return -EINVAL;
		/* We only allow ATT user space socket */
223 224
		if (la.l2_cid &&
		    la.l2_cid != __constant_cpu_to_le16(L2CAP_CID_ATT))
225 226 227
			return -EINVAL;
	}

228 229 230
	if (chan->psm && bdaddr_type_is_le(chan->src_type))
		l2cap_le_flowctl_init(chan);

S
Santosh Nayak 已提交
231
	err = l2cap_chan_connect(chan, la.l2_psm, __le16_to_cpu(la.l2_cid),
232
				 &la.l2_bdaddr, la.l2_bdaddr_type);
233
	if (err)
234
		return err;
235

236 237
	lock_sock(sk);

238
	err = bt_sock_wait_state(sk, BT_CONNECTED,
239
				 sock_sndtimeo(sk, flags & O_NONBLOCK));
240 241 242

	release_sock(sk);

243 244 245
	return err;
}

246 247 248
static int l2cap_sock_listen(struct socket *sock, int backlog)
{
	struct sock *sk = sock->sk;
249
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
250 251 252 253 254 255
	int err = 0;

	BT_DBG("sk %p backlog %d", sk, backlog);

	lock_sock(sk);

256
	if (sk->sk_state != BT_BOUND) {
257 258 259 260
		err = -EBADFD;
		goto done;
	}

261 262 263 264 265
	if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM) {
		err = -EINVAL;
		goto done;
	}

266
	switch (chan->mode) {
267
	case L2CAP_MODE_BASIC:
268
	case L2CAP_MODE_LE_FLOWCTL:
269 270 271 272 273 274 275 276 277 278 279 280 281
		break;
	case L2CAP_MODE_ERTM:
	case L2CAP_MODE_STREAMING:
		if (!disable_ertm)
			break;
		/* fall through */
	default:
		err = -ENOTSUPP;
		goto done;
	}

	sk->sk_max_ack_backlog = backlog;
	sk->sk_ack_backlog = 0;
282 283

	chan->state = BT_LISTEN;
284 285 286 287 288 289 290
	sk->sk_state = BT_LISTEN;

done:
	release_sock(sk);
	return err;
}

291 292
static int l2cap_sock_accept(struct socket *sock, struct socket *newsock,
			     int flags)
293 294 295 296 297 298 299 300 301 302 303 304 305 306
{
	DECLARE_WAITQUEUE(wait, current);
	struct sock *sk = sock->sk, *nsk;
	long timeo;
	int err = 0;

	lock_sock_nested(sk, SINGLE_DEPTH_NESTING);

	timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);

	BT_DBG("sk %p timeo %ld", sk, timeo);

	/* Wait for an incoming connection. (wake-one). */
	add_wait_queue_exclusive(sk_sleep(sk), &wait);
307
	while (1) {
308
		set_current_state(TASK_INTERRUPTIBLE);
309 310 311

		if (sk->sk_state != BT_LISTEN) {
			err = -EBADFD;
312 313 314
			break;
		}

315 316 317
		nsk = bt_accept_dequeue(sk, newsock);
		if (nsk)
			break;
318

319 320
		if (!timeo) {
			err = -EAGAIN;
321 322 323 324 325 326 327
			break;
		}

		if (signal_pending(current)) {
			err = sock_intr_errno(timeo);
			break;
		}
328 329 330 331

		release_sock(sk);
		timeo = schedule_timeout(timeo);
		lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
332
	}
333
	__set_current_state(TASK_RUNNING);
334 335 336 337 338 339 340 341 342 343 344 345 346 347
	remove_wait_queue(sk_sleep(sk), &wait);

	if (err)
		goto done;

	newsock->state = SS_CONNECTED;

	BT_DBG("new socket %p", nsk);

done:
	release_sock(sk);
	return err;
}

348 349
static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr,
			      int *len, int peer)
350 351 352
{
	struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
	struct sock *sk = sock->sk;
353
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
354 355 356

	BT_DBG("sock %p, sk %p", sock, sk);

357
	memset(la, 0, sizeof(struct sockaddr_l2));
358 359 360 361
	addr->sa_family = AF_BLUETOOTH;
	*len = sizeof(struct sockaddr_l2);

	if (peer) {
362
		la->l2_psm = chan->psm;
363
		bacpy(&la->l2_bdaddr, &chan->dst);
364
		la->l2_cid = cpu_to_le16(chan->dcid);
365
		la->l2_bdaddr_type = chan->dst_type;
366
	} else {
367
		la->l2_psm = chan->sport;
368
		bacpy(&la->l2_bdaddr, &chan->src);
369
		la->l2_cid = cpu_to_le16(chan->scid);
370
		la->l2_bdaddr_type = chan->src_type;
371 372 373 374 375
	}

	return 0;
}

376 377
static int l2cap_sock_getsockopt_old(struct socket *sock, int optname,
				     char __user *optval, int __user *optlen)
378 379
{
	struct sock *sk = sock->sk;
380
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
381 382 383 384 385 386 387 388 389 390 391 392 393 394
	struct l2cap_options opts;
	struct l2cap_conninfo cinfo;
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	if (get_user(len, optlen))
		return -EFAULT;

	lock_sock(sk);

	switch (optname) {
	case L2CAP_OPTIONS:
395 396 397 398 399 400 401 402 403 404
		/* LE sockets should use BT_SNDMTU/BT_RCVMTU, but since
		 * legacy ATT code depends on getsockopt for
		 * L2CAP_OPTIONS we need to let this pass.
		 */
		if (bdaddr_type_is_le(chan->src_type) &&
		    chan->scid != L2CAP_CID_ATT) {
			err = -EINVAL;
			break;
		}

405
		memset(&opts, 0, sizeof(opts));
406 407 408 409
		opts.imtu     = chan->imtu;
		opts.omtu     = chan->omtu;
		opts.flush_to = chan->flush_to;
		opts.mode     = chan->mode;
410 411
		opts.fcs      = chan->fcs;
		opts.max_tx   = chan->max_tx;
412
		opts.txwin_size = chan->tx_win;
413 414 415 416 417 418 419 420

		len = min_t(unsigned int, len, sizeof(opts));
		if (copy_to_user(optval, (char *) &opts, len))
			err = -EFAULT;

		break;

	case L2CAP_LM:
421
		switch (chan->sec_level) {
422 423 424 425 426 427 428 429
		case BT_SECURITY_LOW:
			opt = L2CAP_LM_AUTH;
			break;
		case BT_SECURITY_MEDIUM:
			opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
			break;
		case BT_SECURITY_HIGH:
			opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
430
			      L2CAP_LM_SECURE;
431 432 433 434 435 436
			break;
		default:
			opt = 0;
			break;
		}

437
		if (test_bit(FLAG_ROLE_SWITCH, &chan->flags))
438 439
			opt |= L2CAP_LM_MASTER;

440
		if (test_bit(FLAG_FORCE_RELIABLE, &chan->flags))
441 442 443 444 445 446 447 448
			opt |= L2CAP_LM_RELIABLE;

		if (put_user(opt, (u32 __user *) optval))
			err = -EFAULT;
		break;

	case L2CAP_CONNINFO:
		if (sk->sk_state != BT_CONNECTED &&
449 450
		    !(sk->sk_state == BT_CONNECT2 &&
		      test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))) {
451 452 453 454
			err = -ENOTCONN;
			break;
		}

455
		memset(&cinfo, 0, sizeof(cinfo));
456 457
		cinfo.hci_handle = chan->conn->hcon->handle;
		memcpy(cinfo.dev_class, chan->conn->hcon->dev_class, 3);
458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473

		len = min_t(unsigned int, len, sizeof(cinfo));
		if (copy_to_user(optval, (char *) &cinfo, len))
			err = -EFAULT;

		break;

	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

474 475
static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname,
				 char __user *optval, int __user *optlen)
476 477
{
	struct sock *sk = sock->sk;
478
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
479
	struct bt_security sec;
480
	struct bt_power pwr;
481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (level == SOL_L2CAP)
		return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);

	if (level != SOL_BLUETOOTH)
		return -ENOPROTOOPT;

	if (get_user(len, optlen))
		return -EFAULT;

	lock_sock(sk);

	switch (optname) {
	case BT_SECURITY:
498
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
499
		    chan->chan_type != L2CAP_CHAN_RAW) {
500 501 502 503
			err = -EINVAL;
			break;
		}

504
		memset(&sec, 0, sizeof(sec));
505
		if (chan->conn) {
506
			sec.level = chan->conn->hcon->sec_level;
507

508 509 510 511 512
			if (sk->sk_state == BT_CONNECTED)
				sec.key_size = chan->conn->hcon->enc_key_size;
		} else {
			sec.level = chan->sec_level;
		}
513

514 515 516 517 518 519 520 521 522 523 524 525
		len = min_t(unsigned int, len, sizeof(sec));
		if (copy_to_user(optval, (char *) &sec, len))
			err = -EFAULT;

		break;

	case BT_DEFER_SETUP:
		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
			err = -EINVAL;
			break;
		}

526 527
		if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
			     (u32 __user *) optval))
528 529 530 531 532
			err = -EFAULT;

		break;

	case BT_FLUSHABLE:
533
		if (put_user(test_bit(FLAG_FLUSHABLE, &chan->flags),
534
			     (u32 __user *) optval))
535 536 537 538
			err = -EFAULT;

		break;

539 540
	case BT_POWER:
		if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
541
		    && sk->sk_type != SOCK_RAW) {
542 543 544 545
			err = -EINVAL;
			break;
		}

546
		pwr.force_active = test_bit(FLAG_FORCE_ACTIVE, &chan->flags);
547 548 549 550 551 552 553

		len = min_t(unsigned int, len, sizeof(pwr));
		if (copy_to_user(optval, (char *) &pwr, len))
			err = -EFAULT;

		break;

554 555 556 557 558
	case BT_CHANNEL_POLICY:
		if (put_user(chan->chan_policy, (u32 __user *) optval))
			err = -EFAULT;
		break;

559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593
	case BT_SNDMTU:
		if (!enable_lecoc) {
			err = -EPROTONOSUPPORT;
			break;
		}

		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		if (sk->sk_state != BT_CONNECTED) {
			err = -ENOTCONN;
			break;
		}

		if (put_user(chan->omtu, (u16 __user *) optval))
			err = -EFAULT;
		break;

	case BT_RCVMTU:
		if (!enable_lecoc) {
			err = -EPROTONOSUPPORT;
			break;
		}

		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		if (put_user(chan->imtu, (u16 __user *) optval))
			err = -EFAULT;
		break;

594 595 596 597 598 599 600 601 602
	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

603 604 605
static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu)
{
	switch (chan->scid) {
606
	case L2CAP_CID_ATT:
607
		if (mtu < L2CAP_LE_MIN_MTU)
608 609 610 611 612 613 614 615 616 617 618
			return false;
		break;

	default:
		if (mtu < L2CAP_DEFAULT_MIN_MTU)
			return false;
	}

	return true;
}

619 620
static int l2cap_sock_setsockopt_old(struct socket *sock, int optname,
				     char __user *optval, unsigned int optlen)
621 622
{
	struct sock *sk = sock->sk;
623
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
624 625 626 627 628 629 630 631 632 633
	struct l2cap_options opts;
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	lock_sock(sk);

	switch (optname) {
	case L2CAP_OPTIONS:
634 635 636 637 638
		if (bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

639 640 641 642 643
		if (sk->sk_state == BT_CONNECTED) {
			err = -EINVAL;
			break;
		}

644 645 646 647
		opts.imtu     = chan->imtu;
		opts.omtu     = chan->omtu;
		opts.flush_to = chan->flush_to;
		opts.mode     = chan->mode;
648 649
		opts.fcs      = chan->fcs;
		opts.max_tx   = chan->max_tx;
650
		opts.txwin_size = chan->tx_win;
651 652 653 654 655 656 657

		len = min_t(unsigned int, sizeof(opts), optlen);
		if (copy_from_user((char *) &opts, optval, len)) {
			err = -EFAULT;
			break;
		}

658
		if (opts.txwin_size > L2CAP_DEFAULT_EXT_WINDOW) {
659 660 661 662
			err = -EINVAL;
			break;
		}

663 664 665 666 667
		if (!l2cap_valid_mtu(chan, opts.imtu)) {
			err = -EINVAL;
			break;
		}

668 669
		chan->mode = opts.mode;
		switch (chan->mode) {
670 671
		case L2CAP_MODE_LE_FLOWCTL:
			break;
672
		case L2CAP_MODE_BASIC:
673
			clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
674 675 676 677 678 679 680 681 682 683 684
			break;
		case L2CAP_MODE_ERTM:
		case L2CAP_MODE_STREAMING:
			if (!disable_ertm)
				break;
			/* fall through */
		default:
			err = -EINVAL;
			break;
		}

685 686
		chan->imtu = opts.imtu;
		chan->omtu = opts.omtu;
687 688
		chan->fcs  = opts.fcs;
		chan->max_tx = opts.max_tx;
689
		chan->tx_win = opts.txwin_size;
690
		chan->flush_to = opts.flush_to;
691 692 693 694 695 696 697 698 699
		break;

	case L2CAP_LM:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt & L2CAP_LM_AUTH)
700
			chan->sec_level = BT_SECURITY_LOW;
701
		if (opt & L2CAP_LM_ENCRYPT)
702
			chan->sec_level = BT_SECURITY_MEDIUM;
703
		if (opt & L2CAP_LM_SECURE)
704
			chan->sec_level = BT_SECURITY_HIGH;
705

706 707 708 709
		if (opt & L2CAP_LM_MASTER)
			set_bit(FLAG_ROLE_SWITCH, &chan->flags);
		else
			clear_bit(FLAG_ROLE_SWITCH, &chan->flags);
710 711 712 713 714

		if (opt & L2CAP_LM_RELIABLE)
			set_bit(FLAG_FORCE_RELIABLE, &chan->flags);
		else
			clear_bit(FLAG_FORCE_RELIABLE, &chan->flags);
715 716 717 718 719 720 721 722 723 724 725
		break;

	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

726 727
static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname,
				 char __user *optval, unsigned int optlen)
728 729
{
	struct sock *sk = sock->sk;
730
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
731
	struct bt_security sec;
732
	struct bt_power pwr;
733
	struct l2cap_conn *conn;
734 735 736 737 738 739 740 741 742 743 744 745 746 747 748
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	if (level == SOL_L2CAP)
		return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);

	if (level != SOL_BLUETOOTH)
		return -ENOPROTOOPT;

	lock_sock(sk);

	switch (optname) {
	case BT_SECURITY:
749
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
750
		    chan->chan_type != L2CAP_CHAN_RAW) {
751 752 753 754 755 756 757 758 759 760 761 762 763
			err = -EINVAL;
			break;
		}

		sec.level = BT_SECURITY_LOW;

		len = min_t(unsigned int, sizeof(sec), optlen);
		if (copy_from_user((char *) &sec, optval, len)) {
			err = -EFAULT;
			break;
		}

		if (sec.level < BT_SECURITY_LOW ||
764
		    sec.level > BT_SECURITY_HIGH) {
765 766 767 768
			err = -EINVAL;
			break;
		}

769
		chan->sec_level = sec.level;
770

771 772 773
		if (!chan->conn)
			break;

774
		conn = chan->conn;
775 776

		/*change security for LE channels */
777
		if (chan->scid == L2CAP_CID_ATT) {
778 779 780 781 782
			if (!conn->hcon->out) {
				err = -EINVAL;
				break;
			}

783
			if (smp_conn_security(conn->hcon, sec.level))
784 785
				break;
			sk->sk_state = BT_CONFIG;
786
			chan->state = BT_CONFIG;
787

788 789
		/* or for ACL link */
		} else if ((sk->sk_state == BT_CONNECT2 &&
790
			    test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) ||
791 792
			   sk->sk_state == BT_CONNECTED) {
			if (!l2cap_chan_check_security(chan))
793
				set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
794 795
			else
				sk->sk_state_change(sk);
796 797
		} else {
			err = -EINVAL;
798
		}
799 800 801 802 803 804 805 806 807 808 809 810 811
		break;

	case BT_DEFER_SETUP:
		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
			err = -EINVAL;
			break;
		}

		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

812
		if (opt) {
813
			set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
814 815
			set_bit(FLAG_DEFER_SETUP, &chan->flags);
		} else {
816
			clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
817 818
			clear_bit(FLAG_DEFER_SETUP, &chan->flags);
		}
819 820 821 822 823 824 825 826 827 828 829 830 831 832
		break;

	case BT_FLUSHABLE:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt > BT_FLUSHABLE_ON) {
			err = -EINVAL;
			break;
		}

		if (opt == BT_FLUSHABLE_OFF) {
833
			conn = chan->conn;
L
Lucas De Marchi 已提交
834
			/* proceed further only when we have l2cap_conn and
835 836 837 838 839 840 841
			   No Flush support in the LM */
			if (!conn || !lmp_no_flush_capable(conn->hcon->hdev)) {
				err = -EINVAL;
				break;
			}
		}

842 843 844 845
		if (opt)
			set_bit(FLAG_FLUSHABLE, &chan->flags);
		else
			clear_bit(FLAG_FLUSHABLE, &chan->flags);
846 847
		break;

848 849
	case BT_POWER:
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
850
		    chan->chan_type != L2CAP_CHAN_RAW) {
851 852 853 854 855 856 857 858 859 860 861
			err = -EINVAL;
			break;
		}

		pwr.force_active = BT_POWER_FORCE_ACTIVE_ON;

		len = min_t(unsigned int, sizeof(pwr), optlen);
		if (copy_from_user((char *) &pwr, optval, len)) {
			err = -EFAULT;
			break;
		}
862 863 864 865 866

		if (pwr.force_active)
			set_bit(FLAG_FORCE_ACTIVE, &chan->flags);
		else
			clear_bit(FLAG_FORCE_ACTIVE, &chan->flags);
867 868
		break;

869 870 871 872 873 874 875 876 877 878 879 880
	case BT_CHANNEL_POLICY:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt > BT_CHANNEL_POLICY_AMP_PREFERRED) {
			err = -EINVAL;
			break;
		}

		if (chan->mode != L2CAP_MODE_ERTM &&
881
		    chan->mode != L2CAP_MODE_STREAMING) {
882 883 884 885 886
			err = -EOPNOTSUPP;
			break;
		}

		chan->chan_policy = (u8) opt;
887 888 889 890 891

		if (sk->sk_state == BT_CONNECTED &&
		    chan->move_role == L2CAP_MOVE_ROLE_NONE)
			l2cap_move_start(chan);

892 893
		break;

894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934
	case BT_SNDMTU:
		if (!enable_lecoc) {
			err = -EPROTONOSUPPORT;
			break;
		}

		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		/* Setting is not supported as it's the remote side that
		 * decides this.
		 */
		err = -EPERM;
		break;

	case BT_RCVMTU:
		if (!enable_lecoc) {
			err = -EPROTONOSUPPORT;
			break;
		}

		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		if (sk->sk_state == BT_CONNECTED) {
			err = -EISCONN;
			break;
		}

		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		chan->imtu = opt;
		break;

935 936 937 938 939 940 941 942
	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}
943

944 945
static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
			      struct msghdr *msg, size_t len)
946 947
{
	struct sock *sk = sock->sk;
948
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
949 950 951 952 953 954 955 956 957 958 959
	int err;

	BT_DBG("sock %p, sk %p", sock, sk);

	err = sock_error(sk);
	if (err)
		return err;

	if (msg->msg_flags & MSG_OOB)
		return -EOPNOTSUPP;

960
	if (sk->sk_state != BT_CONNECTED)
961
		return -ENOTCONN;
962

963 964 965 966 967 968
	lock_sock(sk);
	err = bt_sock_wait_ready(sk, msg->msg_flags);
	release_sock(sk);
	if (err)
		return err;

969
	l2cap_chan_lock(chan);
970
	err = l2cap_chan_send(chan, msg, len, sk->sk_priority);
971
	l2cap_chan_unlock(chan);
972 973 974

	return err;
}
975

976 977
static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
			      struct msghdr *msg, size_t len, int flags)
978 979
{
	struct sock *sk = sock->sk;
980 981
	struct l2cap_pinfo *pi = l2cap_pi(sk);
	int err;
982 983 984

	lock_sock(sk);

985 986
	if (sk->sk_state == BT_CONNECT2 && test_bit(BT_SK_DEFER_SETUP,
						    &bt_sk(sk)->flags)) {
987 988 989 990 991 992 993 994 995
		if (bdaddr_type_is_le(pi->chan->src_type)) {
			sk->sk_state = BT_CONNECTED;
			pi->chan->state = BT_CONNECTED;
			__l2cap_le_connect_rsp_defer(pi->chan);
		} else {
			sk->sk_state = BT_CONFIG;
			pi->chan->state = BT_CONFIG;
			__l2cap_connect_rsp_defer(pi->chan);
		}
996

997 998
		err = 0;
		goto done;
999 1000 1001 1002 1003
	}

	release_sock(sk);

	if (sock->type == SOCK_STREAM)
1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030
		err = bt_sock_stream_recvmsg(iocb, sock, msg, len, flags);
	else
		err = bt_sock_recvmsg(iocb, sock, msg, len, flags);

	if (pi->chan->mode != L2CAP_MODE_ERTM)
		return err;

	/* Attempt to put pending rx data in the socket buffer */

	lock_sock(sk);

	if (!test_bit(CONN_LOCAL_BUSY, &pi->chan->conn_state))
		goto done;

	if (pi->rx_busy_skb) {
		if (!sock_queue_rcv_skb(sk, pi->rx_busy_skb))
			pi->rx_busy_skb = NULL;
		else
			goto done;
	}

	/* Restore data flow when half of the receive buffer is
	 * available.  This avoids resending large numbers of
	 * frames.
	 */
	if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf >> 1)
		l2cap_chan_busy(pi->chan, 0);
1031

1032 1033 1034
done:
	release_sock(sk);
	return err;
1035 1036
}

1037 1038 1039
/* Kill socket (only if zapped and orphan)
 * Must be called on unlocked socket.
 */
1040
static void l2cap_sock_kill(struct sock *sk)
1041 1042 1043 1044
{
	if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
		return;

1045
	BT_DBG("sk %p state %s", sk, state_to_string(sk->sk_state));
1046 1047

	/* Kill poor orphan */
1048

1049
	l2cap_chan_put(l2cap_pi(sk)->chan);
1050 1051 1052 1053
	sock_set_flag(sk, SOCK_DEAD);
	sock_put(sk);
}

1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085
static int __l2cap_wait_ack(struct sock *sk)
{
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
	DECLARE_WAITQUEUE(wait, current);
	int err = 0;
	int timeo = HZ/5;

	add_wait_queue(sk_sleep(sk), &wait);
	set_current_state(TASK_INTERRUPTIBLE);
	while (chan->unacked_frames > 0 && chan->conn) {
		if (!timeo)
			timeo = HZ/5;

		if (signal_pending(current)) {
			err = sock_intr_errno(timeo);
			break;
		}

		release_sock(sk);
		timeo = schedule_timeout(timeo);
		lock_sock(sk);
		set_current_state(TASK_INTERRUPTIBLE);

		err = sock_error(sk);
		if (err)
			break;
	}
	set_current_state(TASK_RUNNING);
	remove_wait_queue(sk_sleep(sk), &wait);
	return err;
}

1086 1087 1088
static int l2cap_sock_shutdown(struct socket *sock, int how)
{
	struct sock *sk = sock->sk;
1089
	struct l2cap_chan *chan;
1090
	struct l2cap_conn *conn;
1091 1092 1093 1094 1095 1096 1097
	int err = 0;

	BT_DBG("sock %p, sk %p", sock, sk);

	if (!sk)
		return 0;

1098
	chan = l2cap_pi(sk)->chan;
1099 1100 1101 1102
	conn = chan->conn;

	if (conn)
		mutex_lock(&conn->chan_lock);
1103

1104
	l2cap_chan_lock(chan);
1105
	lock_sock(sk);
1106

1107
	if (!sk->sk_shutdown) {
1108
		if (chan->mode == L2CAP_MODE_ERTM)
1109 1110 1111
			err = __l2cap_wait_ack(sk);

		sk->sk_shutdown = SHUTDOWN_MASK;
1112

1113
		release_sock(sk);
1114
		l2cap_chan_close(chan, 0);
1115
		lock_sock(sk);
1116 1117 1118

		if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
			err = bt_sock_wait_state(sk, BT_CLOSED,
1119
						 sk->sk_lingertime);
1120 1121 1122 1123 1124 1125
	}

	if (!err && sk->sk_err)
		err = -sk->sk_err;

	release_sock(sk);
1126
	l2cap_chan_unlock(chan);
1127 1128 1129 1130

	if (conn)
		mutex_unlock(&conn->chan_lock);

1131 1132 1133
	return err;
}

1134 1135 1136 1137 1138 1139 1140 1141 1142 1143
static int l2cap_sock_release(struct socket *sock)
{
	struct sock *sk = sock->sk;
	int err;

	BT_DBG("sock %p, sk %p", sock, sk);

	if (!sk)
		return 0;

1144 1145
	bt_sock_unlink(&l2cap_sk_list, sk);

1146 1147 1148 1149 1150 1151 1152
	err = l2cap_sock_shutdown(sock, 2);

	sock_orphan(sk);
	l2cap_sock_kill(sk);
	return err;
}

1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171
static void l2cap_sock_cleanup_listen(struct sock *parent)
{
	struct sock *sk;

	BT_DBG("parent %p", parent);

	/* Close not yet accepted channels */
	while ((sk = bt_accept_dequeue(parent, NULL))) {
		struct l2cap_chan *chan = l2cap_pi(sk)->chan;

		l2cap_chan_lock(chan);
		__clear_chan_timer(chan);
		l2cap_chan_close(chan, ECONNRESET);
		l2cap_chan_unlock(chan);

		l2cap_sock_kill(sk);
	}
}

1172
static struct l2cap_chan *l2cap_sock_new_connection_cb(struct l2cap_chan *chan)
1173
{
1174
	struct sock *sk, *parent = chan->data;
1175

1176 1177
	lock_sock(parent);

1178 1179 1180 1181 1182 1183
	/* Check for backlog size */
	if (sk_acceptq_is_full(parent)) {
		BT_DBG("backlog full %d", parent->sk_ack_backlog);
		return NULL;
	}

1184
	sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP,
1185
			      GFP_ATOMIC);
1186 1187 1188
	if (!sk)
		return NULL;

1189 1190
	bt_sock_reclassify_lock(sk, BTPROTO_L2CAP);

1191 1192
	l2cap_sock_init(sk, parent);

1193 1194
	bt_accept_enqueue(parent, sk);

1195 1196
	release_sock(parent);

1197 1198 1199
	return l2cap_pi(sk)->chan;
}

1200
static int l2cap_sock_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
1201
{
1202
	struct sock *sk = chan->data;
1203
	int err;
1204

1205 1206
	lock_sock(sk);

1207
	if (l2cap_pi(sk)->rx_busy_skb) {
1208 1209 1210
		err = -ENOMEM;
		goto done;
	}
1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222

	err = sock_queue_rcv_skb(sk, skb);

	/* For ERTM, handle one skb that doesn't fit into the recv
	 * buffer.  This is important to do because the data frames
	 * have already been acked, so the skb cannot be discarded.
	 *
	 * Notify the l2cap core that the buffer is full, so the
	 * LOCAL_BUSY state is entered and no more frames are
	 * acked and reassembled until there is buffer space
	 * available.
	 */
1223 1224 1225
	if (err < 0 && chan->mode == L2CAP_MODE_ERTM) {
		l2cap_pi(sk)->rx_busy_skb = skb;
		l2cap_chan_busy(chan, 1);
1226 1227
		err = 0;
	}
1228

1229 1230 1231
done:
	release_sock(sk);

1232
	return err;
1233 1234
}

1235
static void l2cap_sock_close_cb(struct l2cap_chan *chan)
1236
{
1237
	struct sock *sk = chan->data;
1238 1239 1240 1241

	l2cap_sock_kill(sk);
}

1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282
static void l2cap_sock_teardown_cb(struct l2cap_chan *chan, int err)
{
	struct sock *sk = chan->data;
	struct sock *parent;

	lock_sock(sk);

	parent = bt_sk(sk)->parent;

	sock_set_flag(sk, SOCK_ZAPPED);

	switch (chan->state) {
	case BT_OPEN:
	case BT_BOUND:
	case BT_CLOSED:
		break;
	case BT_LISTEN:
		l2cap_sock_cleanup_listen(sk);
		sk->sk_state = BT_CLOSED;
		chan->state = BT_CLOSED;

		break;
	default:
		sk->sk_state = BT_CLOSED;
		chan->state = BT_CLOSED;

		sk->sk_err = err;

		if (parent) {
			bt_accept_unlink(sk);
			parent->sk_data_ready(parent, 0);
		} else {
			sk->sk_state_change(sk);
		}

		break;
	}

	release_sock(sk);
}

1283 1284
static void l2cap_sock_state_change_cb(struct l2cap_chan *chan, int state,
				       int err)
1285
{
1286
	struct sock *sk = chan->data;
1287 1288

	sk->sk_state = state;
1289 1290 1291

	if (err)
		sk->sk_err = err;
1292 1293
}

1294
static struct sk_buff *l2cap_sock_alloc_skb_cb(struct l2cap_chan *chan,
1295
					       unsigned long len, int nb)
1296
{
1297
	struct sock *sk = chan->data;
1298 1299 1300
	struct sk_buff *skb;
	int err;

1301
	l2cap_chan_unlock(chan);
1302
	skb = bt_skb_send_alloc(sk, len, nb, &err);
1303 1304
	l2cap_chan_lock(chan);

1305 1306
	if (!skb)
		return ERR_PTR(err);
1307

1308 1309
	bt_cb(skb)->chan = chan;

1310
	return skb;
1311 1312
}

1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332
static void l2cap_sock_ready_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;
	struct sock *parent;

	lock_sock(sk);

	parent = bt_sk(sk)->parent;

	BT_DBG("sk %p, parent %p", sk, parent);

	sk->sk_state = BT_CONNECTED;
	sk->sk_state_change(sk);

	if (parent)
		parent->sk_data_ready(parent, 0);

	release_sock(sk);
}

1333 1334
static void l2cap_sock_defer_cb(struct l2cap_chan *chan)
{
1335 1336 1337
	struct sock *parent, *sk = chan->data;

	lock_sock(sk);
1338

1339
	parent = bt_sk(sk)->parent;
1340 1341
	if (parent)
		parent->sk_data_ready(parent, 0);
1342 1343

	release_sock(sk);
1344 1345
}

1346 1347 1348 1349 1350 1351 1352 1353
static void l2cap_sock_resume_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

	clear_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
	sk->sk_state_change(sk);
}

1354 1355 1356 1357 1358 1359 1360 1361 1362
static void l2cap_sock_set_shutdown_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

	lock_sock(sk);
	sk->sk_shutdown = SHUTDOWN_MASK;
	release_sock(sk);
}

1363 1364 1365 1366 1367 1368 1369
static long l2cap_sock_get_sndtimeo_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

	return sk->sk_sndtimeo;
}

1370 1371 1372 1373 1374 1375 1376 1377
static void l2cap_sock_suspend_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

	set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
	sk->sk_state_change(sk);
}

1378 1379 1380
static struct l2cap_ops l2cap_chan_ops = {
	.name		= "L2CAP Socket Interface",
	.new_connection	= l2cap_sock_new_connection_cb,
1381
	.recv		= l2cap_sock_recv_cb,
1382
	.close		= l2cap_sock_close_cb,
1383
	.teardown	= l2cap_sock_teardown_cb,
1384
	.state_change	= l2cap_sock_state_change_cb,
1385
	.ready		= l2cap_sock_ready_cb,
1386
	.defer		= l2cap_sock_defer_cb,
1387
	.resume		= l2cap_sock_resume_cb,
1388
	.suspend	= l2cap_sock_suspend_cb,
1389
	.set_shutdown	= l2cap_sock_set_shutdown_cb,
1390
	.get_sndtimeo	= l2cap_sock_get_sndtimeo_cb,
1391
	.alloc_skb	= l2cap_sock_alloc_skb_cb,
1392 1393
};

1394 1395 1396 1397
static void l2cap_sock_destruct(struct sock *sk)
{
	BT_DBG("sk %p", sk);

1398 1399
	if (l2cap_pi(sk)->chan)
		l2cap_chan_put(l2cap_pi(sk)->chan);
1400

1401 1402 1403 1404 1405
	if (l2cap_pi(sk)->rx_busy_skb) {
		kfree_skb(l2cap_pi(sk)->rx_busy_skb);
		l2cap_pi(sk)->rx_busy_skb = NULL;
	}

1406 1407 1408 1409
	skb_queue_purge(&sk->sk_receive_queue);
	skb_queue_purge(&sk->sk_write_queue);
}

1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422
static void l2cap_skb_msg_name(struct sk_buff *skb, void *msg_name,
			       int *msg_namelen)
{
	struct sockaddr_l2 *la = (struct sockaddr_l2 *) msg_name;

	memset(la, 0, sizeof(struct sockaddr_l2));
	la->l2_family = AF_BLUETOOTH;
	la->l2_psm = bt_cb(skb)->psm;
	bacpy(&la->l2_bdaddr, &bt_cb(skb)->bdaddr);

	*msg_namelen = sizeof(struct sockaddr_l2);
}

1423
static void l2cap_sock_init(struct sock *sk, struct sock *parent)
1424
{
1425
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
1426 1427 1428 1429

	BT_DBG("sk %p", sk);

	if (parent) {
1430 1431
		struct l2cap_chan *pchan = l2cap_pi(parent)->chan;

1432
		sk->sk_type = parent->sk_type;
1433
		bt_sk(sk)->flags = bt_sk(parent)->flags;
1434

1435
		chan->chan_type = pchan->chan_type;
1436 1437
		chan->imtu = pchan->imtu;
		chan->omtu = pchan->omtu;
1438
		chan->conf_state = pchan->conf_state;
1439
		chan->mode = pchan->mode;
1440 1441 1442
		chan->fcs  = pchan->fcs;
		chan->max_tx = pchan->max_tx;
		chan->tx_win = pchan->tx_win;
1443
		chan->tx_win_max = pchan->tx_win_max;
1444
		chan->sec_level = pchan->sec_level;
1445
		chan->flags = pchan->flags;
1446 1447
		chan->tx_credits = pchan->tx_credits;
		chan->rx_credits = pchan->rx_credits;
1448 1449

		security_sk_clone(parent, sk);
1450
	} else {
1451 1452 1453 1454 1455 1456
		switch (sk->sk_type) {
		case SOCK_RAW:
			chan->chan_type = L2CAP_CHAN_RAW;
			break;
		case SOCK_DGRAM:
			chan->chan_type = L2CAP_CHAN_CONN_LESS;
1457
			bt_sk(sk)->skb_msg_name = l2cap_skb_msg_name;
1458 1459 1460 1461 1462 1463 1464
			break;
		case SOCK_SEQPACKET:
		case SOCK_STREAM:
			chan->chan_type = L2CAP_CHAN_CONN_ORIENTED;
			break;
		}

1465 1466
		chan->imtu = L2CAP_DEFAULT_MTU;
		chan->omtu = 0;
1467
		if (!disable_ertm && sk->sk_type == SOCK_STREAM) {
1468
			chan->mode = L2CAP_MODE_ERTM;
1469
			set_bit(CONF_STATE2_DEVICE, &chan->conf_state);
1470
		} else {
1471
			chan->mode = L2CAP_MODE_BASIC;
1472
		}
1473 1474

		l2cap_chan_set_defaults(chan);
1475 1476 1477
	}

	/* Default config options */
1478
	chan->flush_to = L2CAP_DEFAULT_FLUSH_TO;
1479 1480 1481

	chan->data = sk;
	chan->ops = &l2cap_chan_ops;
1482 1483 1484 1485 1486 1487 1488 1489
}

static struct proto l2cap_proto = {
	.name		= "L2CAP",
	.owner		= THIS_MODULE,
	.obj_size	= sizeof(struct l2cap_pinfo)
};

1490 1491
static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
				     int proto, gfp_t prio)
1492 1493
{
	struct sock *sk;
1494
	struct l2cap_chan *chan;
1495 1496 1497 1498 1499 1500 1501 1502 1503

	sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
	if (!sk)
		return NULL;

	sock_init_data(sock, sk);
	INIT_LIST_HEAD(&bt_sk(sk)->accept_q);

	sk->sk_destruct = l2cap_sock_destruct;
1504
	sk->sk_sndtimeo = L2CAP_CONN_TIMEOUT;
1505 1506 1507 1508 1509 1510

	sock_reset_flag(sk, SOCK_ZAPPED);

	sk->sk_protocol = proto;
	sk->sk_state = BT_OPEN;

1511
	chan = l2cap_chan_create();
1512
	if (!chan) {
1513
		sk_free(sk);
1514 1515 1516
		return NULL;
	}

1517 1518
	l2cap_chan_hold(chan);

1519 1520
	l2cap_pi(sk)->chan = chan;

1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533
	return sk;
}

static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
			     int kern)
{
	struct sock *sk;

	BT_DBG("sock %p", sock);

	sock->state = SS_UNCONNECTED;

	if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1534
	    sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546
		return -ESOCKTNOSUPPORT;

	if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
		return -EPERM;

	sock->ops = &l2cap_sock_ops;

	sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
	if (!sk)
		return -ENOMEM;

	l2cap_sock_init(sk, NULL);
1547
	bt_sock_link(&l2cap_sk_list, sk);
1548 1549 1550
	return 0;
}

1551
static const struct proto_ops l2cap_sock_ops = {
1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570
	.family		= PF_BLUETOOTH,
	.owner		= THIS_MODULE,
	.release	= l2cap_sock_release,
	.bind		= l2cap_sock_bind,
	.connect	= l2cap_sock_connect,
	.listen		= l2cap_sock_listen,
	.accept		= l2cap_sock_accept,
	.getname	= l2cap_sock_getname,
	.sendmsg	= l2cap_sock_sendmsg,
	.recvmsg	= l2cap_sock_recvmsg,
	.poll		= bt_sock_poll,
	.ioctl		= bt_sock_ioctl,
	.mmap		= sock_no_mmap,
	.socketpair	= sock_no_socketpair,
	.shutdown	= l2cap_sock_shutdown,
	.setsockopt	= l2cap_sock_setsockopt,
	.getsockopt	= l2cap_sock_getsockopt
};

1571 1572 1573 1574 1575 1576 1577 1578
static const struct net_proto_family l2cap_sock_family_ops = {
	.family	= PF_BLUETOOTH,
	.owner	= THIS_MODULE,
	.create	= l2cap_sock_create,
};

int __init l2cap_init_sockets(void)
{
1579
	int err;
1580

1581 1582 1583
	err = proto_register(&l2cap_proto, 0);
	if (err < 0)
		return err;
1584

1585
	err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
1586 1587
	if (err < 0) {
		BT_ERR("L2CAP socket registration failed");
1588
		goto error;
1589 1590
	}

1591
	err = bt_procfs_init(&init_net, "l2cap", &l2cap_sk_list,
1592
			     NULL);
1593 1594 1595 1596 1597
	if (err < 0) {
		BT_ERR("Failed to create L2CAP proc file");
		bt_sock_unregister(BTPROTO_L2CAP);
		goto error;
	}
1598

1599
	BT_INFO("L2CAP socket layer initialized");
1600

1601
	return 0;
1602 1603

error:
1604 1605
	proto_unregister(&l2cap_proto);
	return err;
1606 1607 1608 1609
}

void l2cap_cleanup_sockets(void)
{
1610
	bt_procfs_cleanup(&init_net, "l2cap");
1611
	bt_sock_unregister(BTPROTO_L2CAP);
1612
	proto_unregister(&l2cap_proto);
1613
}
1614 1615 1616

module_param(enable_lecoc, bool, 0644);
MODULE_PARM_DESC(enable_lecoc, "Enable support for LE CoC");